Sciweavers

382 search results - page 48 / 77
» Tracing Network Attacks to Their Sources
Sort
View
ICNP
2007
IEEE
14 years 1 months ago
Location Privacy in Sensor Networks Against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
K. Mehta, Donggang Liu, Matthew Wright
USS
2008
13 years 10 months ago
An Improved Clock-skew Measurement Technique for Revealing Hidden Services
The Tor anonymisation network allows services, such as web servers, to be operated under a pseudonym. In previous work Murdoch described a novel attack to reveal such hidden servi...
Sebastian Zander, Steven J. Murdoch
SIGCOMM
2009
ACM
14 years 2 months ago
De-anonymizing the internet using unreliable IDs
Today’s Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. In this pa...
Yinglian Xie, Fang Yu, Martín Abadi
WORM
2004
13 years 9 months ago
A study of mass-mailing worms
Mass-mailing worms have made a significant impact on the Internet. These worms consume valuable network resources and can also be used as a vehicle for DDoS attacks. In this paper...
Cynthia Wong, Stan Bielski, Jonathan M. McCune, Ch...
SIGCOMM
2012
ACM
11 years 10 months ago
SP4: scalable programmable packet processing platform
We propose the demonstration of SP4, a software-based programmable packet processing platform that supports (1) stateful packet processing useful for analyzing traffic flows wit...
Harjot Gill, Dong Lin, Lohit Sarna, Robert Mead, K...